<--- Back to Details
First PageDocument Content
Cyberwarfare / Alert correlation / Reason maintenance / Intrusion detection system / Thresh / Vulnerability / ACARM-ng / Computer security / Computer network security / Computing
Date: 2007-11-29 01:14:03
Cyberwarfare
Alert correlation
Reason maintenance
Intrusion detection system
Thresh
Vulnerability
ACARM-ng
Computer security
Computer network security
Computing

Improvements in Security Alert Analysis with a Truth Maintenance System

Add to Reading List

Source URL: www.hicss.hawaii.edu

Download Document from Source Website

File Size: 447,49 KB

Share Document on Facebook

Similar Documents

Computing / Computer network security / Cyberwarfare / Computer security / Multi-agent systems / Spamming / Intrusion detection system / Malware / Computer virus / Botnet / Alert correlation / Infection

BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

DocID: 1qOgk - View Document

Computing / Computer security / Computer network security / Security engineering / Cyberwarfare / Intrusion detection system / System administration / Botnet / Computer virus / Malware / Alert correlation / Bro

BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

DocID: 1lTB9 - View Document

Building Attack Scenarios through Integration of Complementary Alert Correlation Methods ∗ Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert St. Amant Cyber Defense Laboratory Department of Computer Science Nor

DocID: 1kREg - View Document

Alert correlation

Building Attack Scenarios through Integration of Complementary Alert Correlation Methods ∗ Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert St. Amant Cyber Defense Laboratory Department of Computer Science Nor

DocID: 197zU - View Document

Alert messaging / Cluster analysis / Attack patterns / Computer cluster / Computing / Statistics / Alert correlation

Alert Correlation through Triggering Events and Common Resources ∗ Dingbang Xu and Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

DocID: 18Yhx - View Document